We are all so quick to embrace new technologies and no one is around to say: WAIT. THINK FIRST.

The hot topic in 2016 was the Internet of Things (IOT). A plethora of devices were sold in electronics stores
that boasted how you can connect your house to the Internet. Control your thermostat, your security system,
your baby cams, your refrigerator, all from a mobile app that works even when you are away from home.

Our first warning shot came in 2017 when the Internet was shut down from a hack of millions of IOT devices. These IOT devices became
botnets that were used to attack the infrastructure of the internet. And since these were not complete computers
running an antivirus (most were Linux boxes with no user interfaces and fixed passwords), we became vulnerable.

Beyond the hacking of IOT's and creating botnets, specific versions of these devices have been used to invade
the privacy of individuals such as looking into your homes using hacked Baby Cams and hacked security cameras.
Someone can also detect if you're home or not by treating these devices as sensors.

Internet of Things

We are all so quick to embrace new technologies and no one is around to say: WAIT. THINK FIRST.

The hot topic in 2016 was the Internet of Things (IOT). A plethora of devices were sold in electronics stores
that boasted how you can connect your house to the Internet. Control your thermostat, your security system,
your baby cams, your refrigerator, all from a mobile app that works even when you are away from home.

Our first warning shot came in 2017 when the Internet was shut down from a hack of millions of IOT devices. These IOT devices became
botnets that were used to attack the infrastructure of the internet. And since these were not complete computers
running an antivirus (most were Linux boxes with no user interfaces and fixed passwords), we became vulnerable.

Beyond the hacking of IOT's and creating botnets, specific versions of these devices have been used to invade
the privacy of individuals such as looking into your homes using hacked Baby Cams and hacked security cameras.
Someone can also detect if you're home or not by treating these devices as sensors.